Author of the publication

Security Requirements Elicitation Using Method Weaving and Common Criteria.

, and . MoDELS (Workshops), volume 5421 of Lecture Notes in Computer Science, page 185-196. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integration Method for Specification Process., , and . ICSI, page 605-614. IEEE Computer Society, (1990)A Meta-Model for Representing Software Specification & Design Methods., , , and . Information System Development Process, volume A-30 of IFIP Transactions, page 149-166. North-Holland, (1993)Metrics for a Model Driven Development Context., and . ENASE, page 13-22. INSTICC Press, (2008)Meta-modelling based assembly techniques for situational method engineering, , and . Information Systems, 24 (3): 209--228 (May 1999)Early Requirements Analysis for a Socio-Technical System Based on Goal Dependencies., , , and . SoMeT, volume 286 of Frontiers in Artificial Intelligence and Applications, page 125-138. IOS Press, (2016)Establishing Regulatory Compliance in Goal-Oriented Requirements Analysis., , and . CBI (1), page 434-443. IEEE Computer Society, (2017)Cutting a Method Call Graph for Supporting Feature Location., , and . IWESEP, page 55-57. IEEE Computer Society, (2012)Integrating an Idea Generation Method into a Goal-Oriented Analysis Method for Requirements Elicitation., , and . APSEC, page 113-121. IEEE Computer Society, (2005)Sentence-to-Code Traceability Recovery with Domain Ontologies., , and . APSEC, page 385-394. IEEE Computer Society, (2010)Patterns and Aspects for Use Cases: Reuse Techniques for Use Case Descriptions.. ICRE, page 62. IEEE Computer Society, (2000)